DPRK’s APT37 Targets Cambodia With Khmer, ‘VeilShell’ Backdoor – Dark Reading
It’s North Korea versus Cambodia, with Windows default settings and sheer patience allowing the bad guys to avoid easy detection. – Read More
It’s North Korea versus Cambodia, with Windows default settings and sheer patience allowing the bad guys to avoid easy detection. – Read More
Several of the flaws enable remote code execution and denial-of-service attacks while others enable data theft, session hijacking, and other malicious activity. – Read More
Ivanti reports that the bug is being actively exploited in the wild for select customers. – Read More
“Pig butchering,” generative AI, and spear-phishing have all transformed digital warfare. – Read More
Although the veto was a setback, it highlights key debates in the emerging field of AI governance and the potential for California to shape the future of AI regulation. –…
Businesses that successfully manage the complexities of multicloud management will be best positioned to thrive in an increasingly digital and interconnected world. – Read More
NIST standardized three algorithms for post-quantum cryptography. What does that mean for the information and communications technology (ICT) industry? – Read More
The FIN7 group is mounting a sophisticated malware campaign that spans numerous websites, to lure people with a deepfake tool promising to create nudes out of photos. – Read More
CeranaKeeper is bombarding Southeast Asia with data exfiltration attacks via file-sharing services such as Pastebin, OneDrive, and GitHub, researchers say. – Read More
Armed with a staggering arsenal of at least 20,000 different exploits for various Linux server misconfigurations, perfctl is everywhere, annoying, and tough to get rid of. – Read More
Generative AI is being used to make cyberscams more believable. Here’s how organizations can counter that using newly emerging tools and reliable methods. – Read More
Despite a $10 million bounty on one member, APT45 is not slowing down, pivoting from intelligence gathering to extorting funds for Kim Jong-Un’s regime. – Read More
Organizations can use this guide to make decisions for designing, implementing, and managing OT environments to ensure they are both safe and secure, as well as enable business continuity for…
All an attacker needs to exploit flaws in the Common Unix Printing System is a few seconds and less than 1 cent in computing costs. – Read More
The prolific Chinese APT Mustang Panda is the likely culprit behind a sophisticated cyber-espionage attack that sets up persistent remote access to victim machines. – Read More